{"id":"https://openalex.org/W2041144750","doi":"https://doi.org/10.1109/glocom.2011.6134252","title":"Rule Mode Selection in Intrusion Detection and Prevention Systems","display_name":"Rule Mode Selection in Intrusion Detection and Prevention Systems","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W2041144750","doi":"https://doi.org/10.1109/glocom.2011.6134252","mag":"2041144750"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2011.6134252","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2011.6134252","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE Global Telecommunications Conference - GLOBECOM 2011","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025915855","display_name":"Khalid Alsubhi","orcid":"https://orcid.org/0000-0001-5617-4198"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"K. Alsubhi","raw_affiliation_strings":["David R. Cheriton School of Computer Science, University of Waterloo, ONT, Canada"],"affiliations":[{"raw_affiliation_string":"David R. Cheriton School of Computer Science, University of Waterloo, ONT, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022559585","display_name":"Yassir A. Alhazmi","orcid":"https://orcid.org/0000-0002-4684-8352"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Y. Alhazmi","raw_affiliation_strings":["Electrical and Computer Engineering, University of Waterloo, ONT, Canada"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, University of Waterloo, ONT, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109100500","display_name":"N. Bouabdallah","orcid":null},"institutions":[{"id":"https://openalex.org/I4210133778","display_name":"Inria Rennes - Bretagne Atlantique Research Centre","ror":"https://ror.org/04040yw90","country_code":"FR","type":"government","lineage":["https://openalex.org/I1326498283","https://openalex.org/I4210133778"]},{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"N. Bouabdallah","raw_affiliation_strings":["INRIA, Rennes, France"],"affiliations":[{"raw_affiliation_string":"INRIA, Rennes, France","institution_ids":["https://openalex.org/I4210133778","https://openalex.org/I1326498283"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038723583","display_name":"Raouf Boutaba","orcid":"https://orcid.org/0000-0001-7936-6862"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]},{"id":"https://openalex.org/I123900574","display_name":"Pohang University of Science and Technology","ror":"https://ror.org/04xysgw12","country_code":"KR","type":"education","lineage":["https://openalex.org/I123900574"]},{"id":"https://openalex.org/I2799891827","display_name":"Korea Post","ror":"https://ror.org/00p45d091","country_code":"KR","type":"government","lineage":["https://openalex.org/I2799891827","https://openalex.org/I2801339556","https://openalex.org/I4387152098"]}],"countries":["CA","KR"],"is_corresponding":false,"raw_author_name":"R. Boutaba","raw_affiliation_strings":["David R. Cheriton School of Computer Science, University of Waterloo, ONT, Canada","Division of IT Convergence Engineering, POSTECH, South Korea"],"affiliations":[{"raw_affiliation_string":"David R. Cheriton School of Computer Science, University of Waterloo, ONT, Canada","institution_ids":["https://openalex.org/I151746483"]},{"raw_affiliation_string":"Division of IT Convergence Engineering, POSTECH, South Korea","institution_ids":["https://openalex.org/I2799891827","https://openalex.org/I123900574"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5025915855"],"corresponding_institution_ids":["https://openalex.org/I151746483"],"apc_list":null,"apc_paid":null,"fwci":0.3501,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.61957928,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7647749781608582},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7446276545524597},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.7127603888511658},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6213946342468262},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.588932991027832},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.560204029083252},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.523000180721283},{"id":"https://openalex.org/keywords/mode","display_name":"Mode (computer interface)","score":0.47689417004585266},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.4133613109588623},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3394453823566437},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07647418975830078}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7647749781608582},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7446276545524597},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.7127603888511658},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6213946342468262},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.588932991027832},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.560204029083252},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.523000180721283},{"id":"https://openalex.org/C48677424","wikidata":"https://www.wikidata.org/wiki/Q6888088","display_name":"Mode (computer interface)","level":2,"score":0.47689417004585266},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.4133613109588623},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3394453823566437},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07647418975830078},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2011.6134252","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2011.6134252","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE Global Telecommunications Conference - GLOBECOM 2011","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322348","display_name":"Korea Science and Engineering Foundation","ror":"https://ror.org/013aysd81"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1516506771","https://openalex.org/W1563242287","https://openalex.org/W1586466177","https://openalex.org/W1674877186","https://openalex.org/W1994212840","https://openalex.org/W2011039300","https://openalex.org/W2030114781","https://openalex.org/W2079656678","https://openalex.org/W2105045498","https://openalex.org/W2129700391","https://openalex.org/W2156089184","https://openalex.org/W2160883880","https://openalex.org/W2161480401","https://openalex.org/W2171896920","https://openalex.org/W2678934292","https://openalex.org/W4234061764","https://openalex.org/W4240908132","https://openalex.org/W6630856255","https://openalex.org/W6635115027","https://openalex.org/W6637096788","https://openalex.org/W6739612070"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W1495178644","https://openalex.org/W2185594426","https://openalex.org/W2377372927"],"abstract_inverted_index":{"Protection":[0],"and":[1,100,103,127,188],"performance":[2,38,78,102,126,164],"are":[3],"the":[4,36,48,57,61,84,101,111,118,125,155],"major":[5],"requirements":[6],"for":[7],"any":[8,66,161],"Intrusion":[9,31,51],"Detection":[10,32],"and/or":[11],"Prevention":[12,52],"System":[13],"(IDPS).":[14],"Existing":[15],"IDPSs":[16],"do":[17],"not":[18],"seem":[19],"to":[20,116,144,153,169,181],"provide":[21],"a":[22,73,91,136,183],"satisfactory":[23],"method":[24],"of":[25,81,105,120,129],"achieving":[26],"these":[27],"two":[28],"conflicting":[29],"goals.":[30],"Systems":[33,53],"(IDSs)":[34],"fulfill":[35],"network":[37,58,77,163,189],"requirement":[39],"but":[40],"exhibit":[41],"poor":[42],"protection":[43],"under":[44],"successive":[45],"attacks.":[46],"On":[47],"other":[49],"hand,":[50],"(IPSs)":[54],"can":[55,71],"protect":[56],"by":[59],"dropping":[60],"malicious":[62],"packets":[63],"that":[64,142,177],"match":[65],"attacking":[67,85],"pattern;":[68],"however,":[69],"this":[70],"have":[72],"negative":[74],"impact":[75,119],"on":[76,97,110,124],"in":[79,90,151],"terms":[80],"delay":[82],"as":[83],"patterns":[86],"increase.":[87],"This":[88,113],"results":[89,175],"tradeoff":[92],"between":[93,185],"security":[94,121,156,187],"enforcement":[95,122,157],"levels":[96,123,158],"one":[98],"hand":[99],"usability":[104,128],"an":[106,130,146],"enterprise":[107,131],"information":[108,132],"system":[109,186],"other.":[112],"paper":[114],"aims":[115,143],"study":[117],"system.":[133],"We":[134],"propose":[135],"rule":[137],"mode":[138],"selection":[139],"optimization":[140],"technique":[141],"determine":[145],"appropriate":[147],"IDPS":[148],"configuration":[149],"set":[150],"order":[152],"maximize":[154],"while":[159],"avoiding":[160],"unnecessary":[162],"degradation.":[165],"Simulation":[166],"was":[167],"conducted":[168],"validate":[170],"our":[171],"proposed":[172],"technique.":[173],"The":[174],"demonstrate":[176],"it":[178],"is":[179],"desirable":[180],"strike":[182],"balance":[184],"performance.":[190]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
